[tor-commits] r24558: {website} Update abuse FAQ and re-add the ToC. (website/trunk/docs/en)

Mike Perry mikeperry-svn at fscked.org
Mon Apr 4 21:05:06 UTC 2011


Author: mikeperry
Date: 2011-04-04 21:05:05 +0000 (Mon, 04 Apr 2011)
New Revision: 24558

Modified:
   website/trunk/docs/en/faq-abuse.wml
Log:
Update abuse FAQ and re-add the ToC.



Modified: website/trunk/docs/en/faq-abuse.wml
===================================================================
--- website/trunk/docs/en/faq-abuse.wml	2011-04-04 19:53:25 UTC (rev 24557)
+++ website/trunk/docs/en/faq-abuse.wml	2011-04-04 21:05:05 UTC (rev 24558)
@@ -12,6 +12,7 @@
   <div id="maincol"> 
     <!-- PUT CONTENT AFTER THIS TAG -->
     <h1>Abuse FAQ</h1>
+    <hr>
     #<!-- BEGIN SIDEBAR -->
     #<div class="sidebar-left">
     #<h3>Questions</h3>
@@ -30,7 +31,21 @@
     #</ul>
     #</div>
     #<!-- END SIDEBAR -->
-    #<hr>
+    <h3>Questions</h3>
+    <ul>
+    <li><a href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></li>
+    <li><a href="#DDoS">What about distributed denial of service attacks?</a></li>
+    <li><a href="#WhatAboutSpammers">What about spammers?</a></li>
+    <li><a href="#HowMuchAbuse">Does Tor get much abuse?</a></li>
+    <li><a href="#TypicalAbuses">So what should I expect if I run an exit relay?</a></li>
+    <li><a href="#IrcBans">Tor is banned from the IRC network I want to use.</a></li>
+    <li><a href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></li>
+    <li><a href="#Bans">I want to ban the Tor network from my service.</a></li>
+    <li><a href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></li>
+    <li><a href="#RemoveContent">I want some content removed from a .onion address.</a></li>
+    <li><a href="#LegalQuestions">I have legal questions about Tor abuse.</a></li>
+    </ul>
+    <hr>
     
     <a id="WhatAboutCriminals"></a>
     <h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>
@@ -157,6 +172,13 @@
     Template</a>, which explains why your ISP can probably ignore
     the notice without any liability. [Arbitrary ports]</li>
     </ul>
+
+    <p>For a complete set of template responses to different abuse complaint
+    types, see <a
+    href="<wiki>TheOnionRouter/TorAbuseTemplates">the collection of templates
+    on the Tor wiki</a>. You can also proactively reduce the amount of abuse you
+    get by following <a href="<blog>tips-running-exit-node-minimal-harassment">these tips
+    for running an exit node with minimal harassment</a>.
     
     <p>You might also find that your Tor relay's IP is blocked from accessing
     some Internet sites/services. This might happen regardless of your exit
@@ -338,14 +360,27 @@
     to ensure their anonymity (identity theft, compromising computers and
     using them as bounce points, etc).
     </p>
-    
+
     <p>
+    This ultimately means that it is the responsibility of site owners to protect
+    themselves against compromise and security issues that can come from
+    anywhere. This is just part of signing up for the benefits of the
+    Internet. You must be prepared to secure yourself against the bad elements,
+    wherever they may come from. Tracking and increased surveillance are not
+    the answer to preventing abuse.
+    </p>
+
+    <p>
     But remember that this doesn't mean that Tor is invulnerable. Traditional
     police techniques can still be very effective against Tor, such as
-    interviewing suspects, surveillance and keyboard taps, writing style
-    analysis, sting operations, and other physical investigations.
+    investigating means, motive, and opportunity, interviewing suspects,
+    writing style analysis, technical analysis of the content itself, sting operations,
+    keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone
+    including law enforcement groups to train them how to use the Tor software to safely conduct
+    investigations or anonymized activities online.
     </p>
-    
+
+
     <a id="RemoveContent"></a>
     <h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
     <p>The Tor Project does not host, control, nor have the ability to
@@ -359,15 +394,21 @@
     owner and location of the .onion site is hidden even from us.</p>
     <p>But remember that this doesn't mean that hidden services are
     invulnerable. Traditional police techniques can still be very effective
-    against them, such as interviewing suspects, surveillance and keyboard
-    taps, writing style analysis, sting operations, and other physical
-    investigations.</p>
+    against them, such as interviewing suspects, writing style analysis,
+    technical analysis of the content itself, sting operations, keyboard taps,
+    and other physical investigations.</p>
+
     <p>If you have a complaint about child pornography, you may wish to report
     it to the National Center for Missing and Exploited Children, which serves
     as a national coordination point for investigation of child pornography:
     <a href="http://www.missingkids.com/">http://www.missingkids.com/</a>.
     We do not view links you report.</p>
-    
+
+    <p>The Tor Project also encourages the use of Tor by law enforcement in
+    the investigation, stings, and infiltration of child pornography rings.
+    Please contact us for information on Tor trainings.
+    </p>
+
     <a id="LegalQuestions"></a>
     <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
     



More information about the tor-commits mailing list